期刊文献+

基于双混沌互扰系统的图像加密算法 被引量:3

Image encryption algorithm based on inter-perturbation of dual chaotic systems
下载PDF
导出
摘要 针对低维混沌系统有可能退化为周期问题,以及高维混沌系统计算量大的缺陷,提出基于双混沌互扰系统的图像加密算法。通过两个简单的Logistic映射间的互扰,构造一个双混沌互扰系统。双混沌互扰系统的最大特点是扰动项同时包括常数扰动项和随机扰动项,不仅保证了系统必要的复杂性,而且增大了系统参数的取值范围。以双混沌互扰系统作为序列密钥发生器,提出一种改进的二值序列量化方法。对二值序列做随机性检验和相关性分析的结果表明,该二值序列具有良好的伪随机性和相关性,适合作为加密密钥。将其应用于图像加密的仿真实验结果也表明,该二值序列能有效且安全地掩盖明文信息,取得了较好的加密效果。 An image encryption algorithm based on inter-perturbations of dual chaotic systems was proposed for the possible degradation of low-dimensional chaotic system and the high computing work of high-dimensional chaotic system. Dual chaotic system was constructed through inter-perturbations of two simple Logistic mappings. And the most prominent feature of inter-perturbations between chaotic systems was that perturbation included constant perturbation and random perturbation simultaneously, which not only ensured the necessary system complexity, but also increased the range of system parameters. Taking dual chaotic inter-perturbed system as sequence key generator, an improved quantization method for converting chaotic sequence to binary sequence was put forward. Random testing and correlation analysis were done on binary sequence. The results show that the binary sequence has good pseudo-randomness and correlation, and appropriate to be encryption key. Simulation results of image encryption applied with the binary sequence also show that the binary sequence can cover up plaintext effectively and safely, and good encryption results are achieved.
出处 《计算机应用》 CSCD 北大核心 2009年第11期2993-2997,共5页 journal of Computer Applications
基金 上海市教育委员会科研项目(07ZZ94) 上海市重点学科项目(S30501)
关键词 LOGISTIC映射 混沌互扰系统 二值序列 伪随机序列 Logistic mapping chaotic inter-perturbed system binary sequence pseudo random sequence
  • 相关文献

参考文献9

二级参考文献52

共引文献87

同被引文献33

  • 1朱从旭,胡玉平.基于超混沌系统伪随机序列的图像加密算法[J].华中科技大学学报(自然科学版),2012,40(S1):337-341. 被引量:5
  • 2王云松.数字图像加密中的混沌算法研究[D].成都:电子科技大学,2011.
  • 3TAN S K, GUAN S U. Evolving cellular automata to gen- erate nonlinear sequences with desirable propertied[J].App- lied Soft Computing, 2007,7(3) : 1131 - 1134.
  • 4SUNG J, HONG D, HONG S. Coptanalaysis of an involu- tional block cipher using cellular automata[J]. Information Processing Letters, 2007,104(5): 183-185.
  • 5MADJAROVA M, KAKUTA M, OBI T,et al. Opto-elec- tronic block-cipher based on iteration of the 2-D toggle cellular Automata:Algorithm[J].Optical Review,1999,6(2) 110-117.
  • 6FRIDRICH I.Symmetric ciphers based on two-dimensional chaotic maps[J].International Journal of Bifurcation and Chaos,1998,8(6):1259-1284.
  • 7BAOL,ZHOUYQ,CHENCLP,etal.A new chaotic system for image encryption[C]// Proceedings of the 2012 IEEE International Conference on System Science and Engineering.Washington,DC:IEEE Computer Society,2012:69-73.
  • 8AKHAVANA A,SAMSUDINA A,AKHSHANI A.A symmetric image encryption scheme based on combination of nonlinear chaotic maps[J].Journal of the Franklin Institute,2011,348 (6):1797-1813.
  • 9ZHANG G J,LIU Q.A novel image encryption method based on total shuffling scheme[J].Optics Communications,2011,284(12):2775-2780.
  • 10ESLAMI Z,BAKHSHANDEH A.An improvement over an image encryption method based on total shuffling[J].Optics Communications,2013,286(1):51-55.

引证文献3

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部